Session Schedule

IRICT 2018 Session Schedule

Day 1:          Monday, 23rd July, 2018

Parallel Session I
Melur Room (Main Hall): 12:00 pm – 1:00 pm
12:00 pm – 12:20 pm Deep Belief Network for Molecular Feature Selection in Ligand-Based Virtual Screening

Maged Nasser, Naomie Salim, Hentabli Hamza and Faisal Saeed

12:20 pm – 12:40 pm

Energy-Efficient Resource Allocation Technique Using Flower Pollination Algorithm for Cloud Datacenters

Mohammed Joda Usman, Abdul Samad Ismail Abdulsalam Yau Gital Ahmed Aliyu and Tahir Abubakar

12:40 pm – 1:00 pm

Schema Proposition Model for NoSQL Applications

Abdullahi Abubakar Imam, Shuib Basri, Rohiza Ahmad and María T. González-Aparicio

Melati Room 1: 12:00 pm – 1:00 pm
12:00 pm – 12:20 pm Computational Analysis of Dynamics in an Agent-based Model of Cognitive Load and Reading Performance

Hayder M. A. Ghanimi, Azizi Ab Aziz

12:20 pm – 12:40 pm

Phishing Hybrid Feature-Based Classifier by Using Recursive Features Subset Selection and Machine Learning Algorithms

Hiba Zuhair and Ali Selamat

12:40 pm – 1:00 pm

A Survey and Future Vision of Double Auctions-based Autonomous Cloud Service Negotiations

Muhamad Hariz Adnan, Mohd Fadzil Hassan, Izzatdin Abdul Aziz, Nuraini Abdul Rashid

Melati Room 2: 12:00 pm – 1:00 pm
12:00 pm – 12:20 pm

Towards Semantic Interoperability for IoT: Combining Social Tagging Data and Wikipedia to Generate a Domain-Specific Ontology

Mohammed Alruqimi, Noura Aknin, Tawfik Al-Hadhrami and Anne James-Taylor

12:20 pm – 12:40 pm

IoT-Based Smart Waste Management System In A Smart City

Nibras Abdullah, Ola A. Alwesabi, and Rosni Abdullah

12:40 pm – 1:00 pm

Architecture for Latency Reduction in Healthcare Internet-of-Things using Reinforcement Learning and Fuzzy Based Fog Computing

Saurabh Shukla, Mohd Fadzil Hassan, Low Tan Jung and Azlan Awang

Parallel Session II
Melur Room (Main Hall): 2:00 pm – 4:20 pm
2:00 pm – 2:200 pm Data Mining Techniques for Disease Risk Prediction Model: A Systematic Literature Review

Wan Muhamad Taufik Wan Ahmad, Nur Laila Ab Ghani and Sulfeeza Mohd Drus

2:200 pm – 2:40 pm

Quality Features for Summarizing Text Forum Threads by Selecting Quality Replies

Akram Osman, Naomie Salim, Faisal Saeed and Ibrahim Abdelhamid

2:40 pm – 3:00 pm

Modelling and Forecasting Indoor Illumination Time Series Data from Light Pipe System

Waddah Waheeb, Rozaida Ghazali, Lokman Hakim Ismail and Aslila Abd Kadir

3:00 pm – 3:20 pm

A Model for Addressing Quality Issues in Big Data

Onyeabor Grace Amina and Azman Ta’a

3:20 pm – 3:40 pm

Climbing Harmony Search Algorithm For Nurse Rostering Problems

Mohammed Hadwan, Masri Ayob, Mohammed Al-Hagery and Bassam Naji Al-Tamimi

3:40 pm – 4:00 pm

Analyzing Traffic Accident and Casualty Trend Using Data Visualization

Abdullah Sakib, Saiful Adli Ismail, Haslina Sarkan, Azri Azmi, Othman Mohd Yusop

4:00 pm – 4:20 pm

Towards Real-time Customer Satisfaction Prediction Model for Mobile Internet Networks

Ayisat W. Yusuf-Asaju, Zulkhairi B. Dahalin and Azman Ta’a

Melati Room 1: 2:00 pm – 4:20 pm
2:00 pm – 2:200 pm

Proposing a Comprehensive IS Continuance Model and its Factors

Mohd Zuhan Mohd Zain, Ab Razak Che Hussin and Nittee Wanichavorapong

2:200 pm – 2:40 pm

The Interaction of Trust and Social Influence Factors in the Social Commerce Environment

Hasan Beyari and Ahmad Abareshi

2:40 pm – 3:00 pm

Social Network Sites (SNS) Utilization in Learning Landscape– Systematic Literature Review

Nani Amalina Zulkanain, Suraya Miskon, Norris Syed Abdullah, Nazmona Mat Ali and Mahadi Bahari

3:00 pm – 3:20 pm

An Empirical Study of How Social Influence Impact Customer Satisfaction in Social Commerce Sites

Hasan Beyari and Ahmad Abareshi

3:20 pm – 3:40 pm

Searching for Suitable Face of Quality in Crowdsourcing – A Personality Perspective

Shakir Karim, Umair Uddin Shaikh and Zaheeruddin Asif

3:40 pm – 4:00 pm

The Application of Computational Thinking and TRIZ Methodology in Patent Innovation Analytics

Zulhasni Abdul Rahim, Shazlinda Md Yusof, Nooh Abu Bakar and Wan Md Syukri Wan Mohamad

4:00 pm – 4:20 pm

Determinant Factors of Customer Satisfaction for E-hailing Service: A Preliminary Study

Nur Athirah Nabila Mohd Idros, Hazura Mohamed and Ruzzakiah Jenal

Melati Room 2: 2:00 pm – 4:20 pm
2:00 pm – 2:200 pm

Enhancement of Text Steganography Technique using LZW Code and Two-letter Word Technique

Salwa Shakir Baawi, Mohd Rosmadi Mokhtar, and Rossilawati Sulaiman

2:200 pm – 2:40 pm

Acquiring RFID Tag Asymmetric Key from IOT Cyber Physical Environment

Muhammad Thariq Abdul Razak, Nurul Azma Abdullah, Nurul Hidayah A. Rahman

2:40 pm – 3:00 pm

SDN/NFV Based Moving Target DDoS Defense Mechanism

Chien-Chang Liu, Bo-Sheng Huang, Chia-Wei Tseng, Yao-Tsung Yang and Li-Der Chou

3:00 pm – 3:20 pm

Biometric Based Signature Authentication Scheme for Cloud Healthcare Data Security

Gunasekar Thangarasu, P.D.D.Dominic, Kayalvizhi Subramanian and Sajitha Smiley

3:20 pm – 3:40 pm

Exploiting Dom Mutation for the Detection of Ad Injecting Browser Extension

Azreen Zaini, Anazida Zainal

3:40 pm – 4:00 pm

Security Factors based Evaluation of Verification Algorithm for an IoT Access System

Abbas M. Al-Ghaili, Hairoladenan Kasim, Marini Othman and Zainuddin Hassan

4:00 pm – 4:20 pm

Factors Influencing Information Security Awareness of Phishing Attacks From Bank Customers’ Perspective: A Preliminary Investigation

Ayman Asfoor, Fiza Abdul Rahim  and Salman Yussof

Parallel Session III
Melur Room (Main Hall): 4:40 pm – 6:00 pm

4:40 pm – 5:00 pm

DWT-CT Image Watermarking Algorithm with Shuffling and Circular Rotation of Bits

Majdi Al-qdah and Malik Al-qdah

5:00 pm – 5:20 pm

Two Stages Haar-Cascad Face Detection with Reduced False Positive

Abdulaziz Ali Saleh Alashbi, Mohd Shahrizal Bin Sunar  and Qais Ali AL-Nuzaili

5:20 pm – 5:40 pm

An Enhanced Context Aware Face Recognition Alert System for People with Hearing Impairment

Maythem K. Abbas, Bie Tong and Raed Abdulla

5:40 pm6:00 pm

Spell Checker for Somali Language Using Knuth-Morris-Pratt String Matching Algorithm

Ali Olow Jimale, Wan Mohd Nazmee Wan Zainon and Lul Farah Abdullahi

Melati Room 1: 4:40 pm – 6:00 pm

4:40 pm – 5:00 pm

A Systematic Literature Review of Augmented Reality Applications in Libraries

Rasimah Che Mohd Yusoff, Azhar Osman,  Sya Azmeela Shariff, Noor Hafizah Hassan, Nilam Nur Amir Sjarif,  Roslina Ibrahim, Norziha Megat Zainuddin, Nurazean Maarop

5:00 pm – 5:20 pm

The Effect of Demographic Characteristics of Lecturers on Individual and Course Challenges of E-learning Implementation in a Public University in Yemen

Hanan Aldowah, Irfan Umar and Samar Ghazal

5:20 pm – 5:40 pm

Guideline for Organizing Content in Adaptive Learning System

Halina Dahlan, Ab Razak Che Hussin and Yusuf Sahabi Ali

5:40 pm6:00 pm

Development and Validation of Instruments for Assessing Researcher’s Participation in e-collaboration

Jamilah Mahmood, Halina Mohamed Dahlan, Ab Razak Che Hussin and Muhammad Aliif Ahmad

Melati Room 2: 4:40 pm – 6:00 pm

4:40 pm – 5:00 pm

QoS Based Independent Carrier Scheduling Scheme for Heterogeneous Services In 5G LTE-Advanced Networks

Haitham S Ben Abdelmula, M. N.Mohd Warip, Ong Bi Lynn, Naimah Yaakob

5:00 pm – 5:20 pm

Proposed Mechanism based on Genetic Algorithm to Find the Optimal Multi-hop Path in Wireless Sensor Networks

Mohammed Al-Shalabi, Mohammed Anbar and Tat-Chee Wan

5:20 pm – 5:40 pm

A Survey of Millimeter Wave (mm-wave) Communications for 5G: Channel Measurement Below and Above 6 GHz.

Ahmed M Al-samman, Marwan Hadri Azmi, Tharek Abd Rahman

 

5:40 pm6:00 pm

Densification of 5G Wireless Access Network for Urban Area at Taiz City, Yemen

Redhwan Q. Shaddad, Amer A. Al-Mekhlafi, Haithm M. Al-Gunid, Osama M. Al-Kamali, Hussain A. Al-Thawami, Hussum A. Mohammed, Mohammed A. Abduljalil, Nasher M. Sallam, Saber F. Al-Ariqi, Taha M. Assag

Day 2:             Tuesday, 24th July, 2018

Parallel Session I
Melur Room (Main Hall): 8:30 am – 9:50 am
8:30 am – 8:50 am

A Fully Adaptive Image Classification Approach for Industrial Revolution 4.0

Syed Muslim Jameel, Manzoor Ahmed Hashmani, Hitham Alhussain, Arif Budiman

8:50 am – 9:10 am

Success Factors for Business Intelligence Systems Implementation in Higher Education Institutions – A Review

Salamatu Musa, Nazmona Binti Mat Ali, Suraya Binti Miskon, Mustapha Abubakar Giro

9:10 am – 9:30 am

A Review on Exploiting Social Media Analytics for the Growth of Tourism

Lim Xiao Yan and Preethi Subramanian

9:30 am – 9:50 am

Enterprise Resource Planning and Business Intelligence to enhance Organizational Performance in Private Sector of KSA: A Preliminary Review

Showaimy Aldossari and Umi Asma Mukhtar

Melati Room 1: 8:30 am – 9:50 am
8:30 am – 8:50 am

A Systematic Mapping Study on Microservices

Mohammad Sadegh Hamzehloui, Shamsul Sahibuddin, Khalil Salah

8:50 am – 9:10 am

A Theoretical Framework for Improving Software Project Monitoring Task of Agile Kanban Method

Hamzah Alaidaros, Mazni Omar, and Rohaida Romli

9:10 am – 9:30 am

Non-Functional Ontology Requirements Specifications: Islamic Banking Domain

Ahmad Shaharudin Abdul Latiff, Haryani Haron and Muthukkaruppan Annamalai

9:30 am – 9:50 am

A Proposed Framework using Exploratory Testing to improve Software Quality in SME’s

Shuib Basri, Dhanapal Durai Dominic, Thangiah Murugan and Malek Ahmad Almomani

Melati Room 2: 8:30 am – 9:50 am
8:30 am – 8:50 am

RFID Smart Shelf based on Reference Tag Technique

Wan Nurfatin Faiqa Binti Wan Abdullah, Muhammad Rafie Bin Hj. Mohd. Arshad, Kamal Karkonasasi and Seyed Aliakbar Mousavi

8:50 am – 9:10 am

Literature Survey on Enhancement of MOM for Intelligent Cross-platform Communications in Service Oriented Architecture

Najhan Muhamad Ibrahim and Mohd Fadzil Hassan

9:10 am – 9:30 am

Intelligent Offset Time Algorithm for Optical Burst Switching Networks

Abdulsalam A. Yayah, Abdul Samad Ismail, Tawfik Al-Hadhrami and Yahaya Coulibaly

9:30 am – 9:50 am

Planning and Optimization of LTE Radio Access Network for Suburban and Rural Area at Taiz City, Yemen

Redhwan Q. Shaddad, Nabil Y. Saleh, Aziz A. Mohammed, Zahi A. Saeed, Afif A.  Shaif and Samir A Al-Gaialni

Parallel Session II
Melur Room (Main Hall): 10:20 am – 1:00 pm
10:20 am – 10:40 am

A Proposed Tourism Information Accuracy Assessment (TIAA) Framework

Sivakumar Pertheban, Ganthan Narayana Samy,   Bharanidharan Shanmugam, Sundresan Perumal

10:40 am – 11:00 am

Big Data Analytics in the Malaysian Public Sector: The Determinants of Value Creation

Esmat A. Wahdain, Ahmad Suhaimi Baharudin and Mohammad Nazir Ahmad

11:00 am – 11:20 am

Intention to use a Cloud-Based Point of Sale Software among Retailers in Malaysia: The Mediating Effect of Attitude

Kamal Karkonasasi, Lingam Arusanthran, G.C. Sodhy, Seyed Aliakbar Mousavi, Putra Sumari

11:20 am – 11:40 am

Conceptualizing a Model for the Effect of Information Culture on Electronic Commerce Adoption

Fadi A.T. Herzallah, Mohammed A. Al-Sharafi, Qasim Alajmi, Muriati Mukhtar, Ruzaini Abdullah Arshah and  Dirar Eleyan

11:40 am – 12:00 pm

Information Relevance Factors of Argument Quality for E-Commerce Consumer Review

Nur Syadhila Bt Che Lah, Ab Razak Bin Che Hussin and Halina Bt Mohamed Dahlan

12:00 pm – 12:20 pm

The Determinants of Customer Knowledge Sharing Behavior: A Review Study

Hasan Sari, Marini Othman, Abbas M. Al-Ghaili

12:20 pm – 12:40 pm

Value Innovation in the Malaysian Telecommunications Service Industry: Case Study

Mohammed A. Hajar, Daing Nasir Ibrahim and Mohammed A. Al-Sharafi

12:40 pm – 1:00 pm

A Framework for Electronic Records Management System Adoption in the Higher Professional Education: Individual, Technological and Environmental Factors

Muaadh Mukred, Zawiyah M. Yusof, Umi Asma’ Mokhtar, Fariza Fauzi

Melati Room 1: 10:20 am – 1:00 pm
10:20 am – 10:40 am

ESCAPE: Interactive Fire Simulation & Training for Children using Virtual Reality

Wan Fatimah Wan Ahmad, Aliza Sarlan, Nurfadzira Ahmad Rauf

10:40 am – 11:00 am

Self-Reflective Visualizations of Patient-Centered Health Information Systems

Archanaa Visvalingam, Jaspaljeet Singh Dhillon, Saraswathy Shamini Gunasekaran, Alan Cheah Kah Hoe

11:00 am – 11:20 am

Potential Measures to Enhance Information Security Compliance in Healthcare Internet of Things

Premylla Jeremiah, Ganthan Narayana Samy, Bharanidharan Shanmugam, Kannan Ponkoodalingam and Sundresan Perumal

11:20 am – 11:40 am

A Proposed Conceptual Framework for Mobile Health Technology Adoption among Employees at Workplaces in Malaysia

Hasan Sari, Marini Othman, Abbas M. Al-Ghaili

 

11:40 am – 12:00 pm

Problematic of Massively Multiplayer Online Game Addiction in Malaysia

Muhammad Muhaimin, Norshakirah Aziz, Mazeyanti Ariffin

12:00 pm – 12:20 pm

Exploring Barriers that Affect Telerehabilitation (TeleRehab) Readiness: A Case Study of Rehabilitation Centre in Malaysia

Tiara Izrinda Jafni, Mahadi Bahari, Waidah Ismail and Muhammad Hafiz Hanafi

12:20 pm – 12:40 pm

A Study on Mobile Applications Developed for Children with Autism

Naziatul Shima Abdul Aziz, Wan Fatimah Wan Ahmad and Ahmad Sobri Hashim

12:40 pm – 1:00 pm

Heuristic Evaluation of the Smartphone Applications in Supporting Elderly

Hasanin Mohammed Salman, Wan Fatimah Wan Ahmad and Suziah Sulaiman

Melati Room 2: 10:20 am – 1:00 pm
10:20 am – 10:40 am

Novel Risk Assessment Method to Identify Information Security Threats in Cloud Computing Environment

Ganthan Narayana Samy, Sameer Hasan Albakri, Nurazean Maarop, Pritheega Magalingam, Doris Hooi-Ten Wong, Bharanidharan Shanmugam and Sundresan Perumal

10:40 am – 11:00 am

Proposing a New Approach for Securing DHCPv6 Server Against Rogue DHCPv6 Attack in IPv6 Network

Ayman Al-Ani, Mohammed Anbar, Rosni Abdullah, and Ahmed K. Al-Ani

11:00 am – 11:20 am

A Review of Ransomware Families and Detection Methods

Helen Jose Chittooparambil, Bharanidharan Shanmugam, Sami Azam, Krishnan Kannoorpatti, Mirjam Jonkman and Ganthan Narayana Samy

11:20 am – 11:40 am

A Survey on SCADA Security and Honeypot in Industrial Control System

Kuan-Chu Lu  and I-Hsien Liu  and Meng-Wei Sun  and Jung-Shian Li

11:40 am – 12:00 pm

Review on Feature Selection Algorithms for Anomaly-Based Intrusion Detection System

Taief Alaa Alamiedy, Mohammed Anbar, Ahmed K. Al-Ani, Bassam Naji Al-Tamimi, and Nameer Faleh

12:00 pm – 12:20 pm

Forensic Use Case Analysis of User Input in Windows Application

Funminiyi Olajide, Tawfik Al-hadrami  and Anne James-Taylor

12:20 pm – 12:40 pm

Digital Investigation and Forensic User Analysis

Funminiyi Olajide, Tawfik Al-Hadrami and Anne James-Taylor

12:40 pm – 1:00 pm

Security in Internet of Things: Issues, Challenges and Solutions

Hanan Aldowah, Shafiq Ul Rehman, and Irfan Umar

Parallel Session III
Melur Room (Main Hall): 2:00 pm – 4:20 pm
2:00 pm – 2:20 pm Electronic Word of Mouth Engagement Model in Social Commerce

Yusuf Sahabi Ali and Ab Razak Che Hussin

2:20 pm – 2:40 pm

Social Media for Informal learning Usage in Malaysia: Barriers and Benefits

Mohmed Y. Mohmed Al-Sabaawi and Halina Mohamed Dahlan

2:40 pm – 3:00 pm

Towards the Development of a Citizens’ Trust Model in Using Social Media For e-government Services: The Context of Pakistan

Sohrab Khan, Nor Zairah Ab. Rahim, Nurazean Maarop

3:00 pm – 3:20 pm

The Influence of Social Presence and Trust on Customers’ Loyalty to Social Commerce Websites

Hilal Alhulail, Martin Dick and Ahmad Abareshi

3:20 pm – 3:40 pm

The Influence of Word-of-Mouth on Customer Loyalty to Social Commerce Websites: Trust as a Mediator

Hilal Alhulail, Martin Dick and Ahmad Abareshi

3:40 pm- 4:00 pm

Determining Underlying Factors that Influence Online Social Network Usage among Public Sector Employees in the UAE

Ali Ameen, Hamad Almari, Osama Isaac

4:00 pm – 4:20 pm

A Theoretical Framework to Build Trust and Prevent Fake News in Social Media using Blockchain

Tee Wee Jing and Raja Kumar Murugesan

Melati Room 1: 2:00 pm – 4:20 pm
2:00 pm – 2:20 pm

Pairwise Test Suite Generation using Adaptive Teaching Learning-based Optimization Algorithm with Remedial Operator

Fakhrud Din and Kamal Z. Zamli

2:20 pm – 2:40 pm

Novel Multi-Swarm Approach for Balancing Exploration and Exploitation in Particle Swarm Optimization

Sinan Q. Salih , AbdulRahman A. Alsewari, Bellal Al-Khateeb and Mohamad Fadli Zolkipli

2:40 pm – 3:00 pm

A Fuzzy Logic-based Cloud Computing Provider’s Evaluation and Recommendation Model

Mohd Hilmi Hasan, Norshakirah A Aziz, Emelia Akashah P Akhir, Nur Zarith Natasya Mohd Burhan and Razulaimi Razali

3:00 pm – 3:20 pm

Self-Adaptive Population Size Strategy Based on Flower Pollination Algorithm for T-way Test Suite Generation

Abdullah B. Nasser and Kamal Z. Zamli

3:20 pm – 3:40 pm

Feature Selection Method Based on Grey Wolf Optimization for Coronary Artery Disease Classification

Qasem Al-Tashi, Helmi Rais and Said Jadid

3:40 pm- 4:00 pm

Combined Support Vector Machine and Pattern Matching for Hadith Question Classification System

Ali Muttaleb Hasan, Taha H. Rassem, M.N. Noorhuzaimi@Karimah

 4:00 pm – 4:20 pm

Traffic Bottleneck Reconstruction LIDAR Orthoimages: A RANSAC Algorithm Feature Extraction

Md. Nazmus Sakib , Md. Ashiqur Rahman

Melati Room 2: 2:00 pm – 4:00 pm
2:00 pm – 2:20 pm

Data Quality Issues in Big Data: A Review

Fathi Ibrahim Salih, Saiful Adli Ismail, Mosaab M. Hamed, Othman Mohd Yusop, Azri Azmi, Nurulhuda Firdaus Mohd Azmi

2:20 pm – 2:40 pm

Comparative Study of Segmentation and Feature Extraction Method on Finger Movement

Nurazrin Mohd Esa, Azlan Mohd Zain, Mahadi Bahari, Suhaila Mohd Yusuf

2:40 pm – 3:00 pm

Realizing the Value of Big Data in Process Monitoring and Control: Current Issues and Opportunities

Saddaf Rubab, Syed A. Taqvi, Mohd Fadzil Hassan

3:00 pm – 3:20 pm

Comparing the Performance of FCBF, Chi-Square and ReliefF Filter Feature Selection Algorithms in Educational Data Mining

Maryam Zaffar, Manzoor Ahmed Hashmani, K.S. Savita

3:20 pm – 3:40 pm

The Study of Co-occurrences Index’s Keywords for Malaysian’s Publication

Nurul Mardhiah Azura Md Nadzar, Aryati Bakri, Roliana Ibrahim

3:40 pm- 4:00 pm

Cloud Computing and Internet of Things Integration Systems: A Review

Ayman Amairah, Bassam Naji Al-tamimi, Mohammed Anbar and Khalid Aloufi


Click here to download the IRICT 2018 Session Schedule